Handling Instructions for CALL Electronic Media and Paper Products Center for Army Lessons Learned (CALL) authorizes official use of this CALL product for operational and institutional purposes that contribute to the overall success of U.S., coalition, and allied efforts. The information contained in this product reflects the actions of units in the field and may not necessarily be approved U.S. Army policy or doctrine. This product is designed for official use by U.S., coalition, and allied personnel and cannot be released to the public without the expressed written consent of CALL. This product has been furnished with the expressed understanding that it will be used for official defense-related purposes only and that it will be afforded the same degree of protection that the U.S. affords information marked “U.S. UNCLASSIFIED, For Official Use Only [FOUO]” in accordance with U.S. Army Regulation (AR) 380-5, section 5-2. Official military and civil service/government personnel, to include all coalition and allied partners may paraphrase; quote; or use sentences, phrases, and paragraphs for integration into official products or research. However, integration of CALL “U.S. UNCLASSIFIED, For Official Use Only [FOUO]” information into official products or research renders them FOUO, and they must be maintained and controlled within official channels and cannot be released to the public without the expressed written consent of CALL. This product may be placed on protected UNCLASSIFIED intranets within military organizations or units, provided that access is restricted through user ID and password or other authentication means to ensure that only properly accredited military and government officials have access to these products. Regulations strictly forbid posting CALL “U.S. UNCLASSIFIED, For Official Use Only [FOUO]” documents to Department of Defense (DOD) Web sites that do not restrict access to authorized personnel. AR-25-1, 15 Jul 2005, Army Knowledge Management and Information Technology, paragraph 6-4 n (2) (b) and DOD Web Site Administration Policy and Procedures (11 Jan 2002), Part II, paragraph 3.6.1 require appropriate mechanisms to protect sensitive information. When no longer needed, all CALL “U.S. UNCLASSIFIED, For Official Use Only [FOUO]” paper products and electronic media will be shredded or destroyed using approved paper shredders or CDROM destroyers. To allied and coalition personnel: This information is furnished with the understanding that it is to be used for defense purposes only, that it is to be afforded essentially the same degree of security protection as such information is afforded by the United States, and that it is not to be revealed to another country or international organization without the written consent of CALL. U.S. UNCLASSIFIED REL NATO, GCTF, ISAF, MCFI, ABCA For Official Use Only COIST HANDBOOK Foreword In the current operational environment, small units are forming and resourcing company-level intelligence (S-2) sections. These sections or cells are necessary due to the decentralized nature of counterinsurgency (COIN) operations and go by a variety of names that includes the company intelligence cell, the company exploitation cell, the company S-2 section, or the company intelligence support team (COIST). For the purposes of this handbook, the term COIST will be used. In conventional operations, intelligence is passed from higher to lower headquarters, as the higher headquarters is resourced with intelligence-gathering capabilities and sufficiently staffed with the analytical personnel necessary to collect, analyze, and disseminate pertinent information. In COIN operations, information generally flows in the opposite direction. Small units operating on the ground must gather and determine the significance of intelligence, often without the assistance, analysis, and filtering of higher-level intelligence staff support. This small-unit intelligence enables the company to maintain situational awareness and possibly even attain brief periods of situational understanding and information superiority as it conducts daily activities such as patrols, engagements, and combat logistics patrols. Key concepts covered in this publication include: • COIST mission and purpose • COIST organization • COIST systems and tools • COIST battle rhythm • Integration of COIST operations in platoons through brigades • COIST targeting • Tactical Ground Reporting System debriefing techniques U.S. UNCLASSIFIED REL NATO, GCTF, ISAF, MCFI, ABCA For Official Use Only i COIST HANDBOOK Company Intelligence Support Team Handbook Table of Contents Chapter 1. Company Intelligence Support Team Mission and Purpose 1 Chapter 2. Company Intelligence Support Team Organization 7 Chapter 3. Company Intelligence Support Team Systems and Tools 17 Chapter 4. Company Intelligence Support Team Battle Rhythm 25 Chapter 5. Integration of Company Intelligence Support Team Operations: Platoon Through Brigade 35 Chapter 6. Company Intelligence Support Team Targeting 43 Appendix A. Ten-Step Tactical Ground Reporting System Debrief 51 Center for Army Lessons Learned Director Colonel Robert W. Forrester Chief, Analysis Division George J. Mordica II CALL Analyst Brice Johnson Production Coordinator Kristine Bell Editor Jenny Solon Graphic Artist Dan Neal Distribution Manager Candice Miller U.S. UNCLASSIFIED REL NATO, GCTF, ISAF, MCFI, ABCA For Official Use Only iii CENTER FOR ARMY LESSONS LEARNED The Secretary of the Army has determined that the publication of this periodical is necessary in the transaction of the public business as required by law of the Department. Unless otherwise stated, whenever the masculine or feminine gender is used, both are intended. Note: Any publications (other than CALL publications) referenced in this product, such as ARs, FMs, and TMs, must be obtained through your pinpoint distribution system. iv U.S. UNCLASSIFIED REL NATO, GCTF, ISAF, MCFI, ABCA For Official Use Only COIST HANDBOOK Chapter 1 Company Intelligence Support Team Mission and Purpose The mission of COISTs is to describe the effects of the weather, enemy, terrain, and local population on friendly operations to reduce uncertainty and aid in decision making. This is a simple and clear mission with a powerful purpose. However, the operation of the company COIST is far from simple. Company leaders must review and interpret huge volumes of data on a daily basis to determine their relevance and relationships. A few examples of this data include weapons intelligence team reports, patrol debriefs, intelligence summaries (INTSUMs), link diagrams, and be-on-the-lookout (BOLO) lists. Although the commander will determine and direct the exact requirements for the COIST, specified and implied tasks usually include targeting; intelligence, surveillance, and reconnaissance (ISR); patrol briefings and debriefings; detainee operations; and site exploitation. The COIST provides a 24/7 analytical, production, and dissemination capability at the company level, which gives the commander options to exploit enemy vulnerabilities. Analysis is focused on the company OE, with the ability to report and help populate the overall battalion (BN) and brigade combat team common operational picture. If managed properly, a COIST will assist the commander in managing battlefield effects and operational expectations across all full spectrum operations. COIST operations in a COIN environment are typically conducted in conjunction with the company fire support team. The company commander establishes a COIST that is a company-level intelligence section and provides an array of capabilities to the company. The COIST is part of the command post or fusion cell and has the following responsibilities: • Provides SA and SU for the commander. • Secures assets and intelligence information to target insurgents. • Proposes targets to the commander for review and nomination. • Requests classified products and sensitive information from the BN S-2 for inclusion in the target packet. • Develops the company-level target packets, and requests assets and/or effects in support of lethal and nonlethal operations. Key tasks for COIST operations include the following: • Collect data and conduct pattern analysis to include the following: º Collect and analyze patrol debriefs. º Collect all electronic data such as the Biometrics Automated Toolset (BAT) and Handheld Interagency Identity Detection Equipment systems and cellular exploitation from returning patrols. º Track and analyze all significant activities. U.S. UNCLASSIFIED REL NATO, GCTF, ISAF, MCFI, ABCA For Official Use Only 1 CENTER FOR ARMY LESSONS LEARNED º Generate analytical, assessment, and mission summary products for the commander. º Conduct local intelligence analysis, forecast enemy actions, and prepare the threat situation template (SITEMP) to include threat most likely course of action/most dangerous course of action. º Battle track enemy significant activities to develop enemy patterns and tactics, techniques, and procedures. • Facilitate the exchange and dissemination of intelligence such as information flow between company and BN S-2 graphic intelligence summaries and intelligence sharing with adjacent units, as well as perform the following: º Maintain updated intelligence boards for outgoing patrols. º Conduct mission prebriefs and debriefs. º Produce, process, and analyze information/material from site exploitation. º Disseminate combat information and actionable intelligence. º Continuously update all intelligence trackers and databases (Tactical Ground Reporting [TiGR] System), and maintain SA within the company area of operation (AO) and area of interest. º Conduct predictive analysis, and maintain a predictive analysis board identifying likely enemy activities over the next 48 hours and over the next few weeks. º Establish clear communications with the BN S-2 and adjacent companies, and ensure that information flows both up and down the chain of command in a timely manner. º Request information from the BN S-2 as required. • Advise the commander on intelligence-related matters to include the following: º Conduct intelligence preparation of the battlefield (IPB) for company operations. º Support situational development and maintain understanding of the OE. º Recommend company priority information requirements (PIRs) and specific information requirements (SIR) to the commander. º Provide deception recommendations to the commander. 2 U.S. UNCLASSIFIED REL NATO, GCTF, ISAF, MCFI, ABCA For Official Use Only COIST HANDBOOK º Conduct assessment of effects and exploitation following a mission. º Provide predictive analysis to the commander. º Prepare to brief the commander on the current situation at any time. º Analyze friendly trends from the enemy’s perspective, and identify unnecessary vulnerabilities and patterns the company is setting. º Request assistance from the BN S-2 to conduct specific detailed analysis beyond company capabilities. • Manage the company’s lethal and nonlethal targeting. At the company level, targeting is the overall synthesis of all sources of available intelligence—BN and sister-company INTSUMs, link diagrams, events pattern analysis (indirect fire, sniper, improvised explosive device [IED]), terrain analysis, BOLO lists, and most importantly, patrol debriefs. This continuous data fusion helps create a running SITEMP of the unit’s OE. º Work with the commander to further develop targets and identify gaps in the current intelligence picture. º Provide targeting recommendations to the commander. º Assist in target development (both lethal and nonlethal). º Develop company-level high-value individuals (HVIs) and associated target packets to effectively action targets of opportunity. • Supervise the company’s ISR program. Based on the commander’s guidance regarding particular targets, the COIST develops collection SIR and an ISR collection matrix, which may require the COIST to request BN or higher-level assets, task the company’s unmanned aircraft system team, or work with the commander to task organic patrols to gather required information through observation or tactical questioning (TQ). º Conduct planning, synchronization, and request for assets. º Ensure all casual and regular informants are entered into the informant contact log and have been entered into the BAT system. º Coordinate with the BN S-2 and human intelligence collection team for review of products and the assignment of contact tracking numbers. º Facilitate walk-in informants. U.S. UNCLASSIFIED REL NATO, GCTF, ISAF, MCFI, ABCA For Official Use Only 3 CENTER FOR ARMY LESSONS LEARNED º Establish an informant meeting and debriefing area, and ensure that security personnel are prepared to receive local national informants: * The meeting room should have chairs or couches, a table, drinks available, an ashtray, large-scale unmarked maps for map-tracking purposes, and no windows. * When walk-in informants are expected, ensure that security personnel are well briefed on what to expect and what to do when an informant arrives. * COISTs are not authorized to task a source. They may request information from local nationals and other willing informants. • Manage the patrol prebrief and debrief processes for the company. The patrol prebrief is not to be confused with the patrol order given by the patrol leader. The prebrief is generally given by a member of the COIST to the patrol prior to departing the forward operating base, combat outpost, or joint security site. The prebrief is perhaps the most important function of the COIST. During this brief, the team shares events that occurred in the OE over the past 12–24 hours, route status, ISR collection assets in use throughout the BN’s OE, SIR tasked to answer, other units operating within the OE, BOLO lists, applicable target packets, and predictive analysis based on analysis during the targeting phase. During this process, outgoing patrols are briefed on the following: º Current threat assessment for the AO with regard to significant activities in the last 24 hours. º Current IED threats and locations of concentrated IED attacks. º Enemy activity expectations for the next 24 hours. º Current HVI list with pictures if possible. º Information requirements. º Possible TQ guidance. The debrief, when based on a solid prebrief, feeds the COIST with data to continue its IPB and ultimately help begin the next targeting cycle for the company. The debrief should provide feedback on all areas covered in the prebrief as well as provide updated pictures and may also include data from detainee operations and site exploitation. Other important points regarding debriefs include the following: º Debrief incoming patrols to develop the common operational picture for the company AO. º Ensure a standard and approved debriefing form is used to record all pertinent information. 4 U.S. UNCLASSIFIED REL NATO, GCTF, ISAF, MCFI, ABCA For Official Use Only COIST HANDBOOK º Post updated intelligence information for ease of reference by patrol leaders, and consider operational security when choosing a location in which to post the information. º Identify little-known areas within the company AO that require informal assessments by patrols to identify the following: * Areas * Structures * Capabilities * Organizations * People * Events º All debriefs should be entered as quickly as possible as a text report in TiGR so information can be entered into the database and shared throughout the unit’s OE. Detainee Operations Detainee operations for the COIST are twofold: • Ensure departing patrol units are armed with complete detainee packets and the knowledge to properly complete the forms and use the equipment. • Maintain detainee packet data, copies of complete packets, and track the current location and status of the company’s detainees. Site Exploitation This function is similar to detainee operations in that the COIST must ensure units depart on patrols trained and equipped with the proper site exploitation paperwork and equipment. Upon completion of the patrol and following debriefs, the COIST sorts through photos collected, downloads biometric data, and manages databases. It is here that the COIST once again begins its data synthesis to update its targeting, thus beginning the cycle again. The COIST submits document and media exploitation material to higher headquarters in a timely manner. COISTs must ensure company-level TQ does not inadvertently become unlawful interrogation by adhering to the following guidance: • TQ will involve direct questions only. • TQ will not use interrogation approaches, defined as “any means used to entice a detained person to give information he would not normally give.” At no time will TQ involve threats directed at the detainee or his family. U.S. UNCLASSIFIED REL NATO, GCTF, ISAF, MCFI, ABCA For Official Use Only 5 CENTER FOR ARMY LESSONS LEARNED Conclusion The COIST is not manned, equipped, or authorized by a modified table of organization and equipment but is commonplace in deployed companies due to terrain, distances, and the decentralized nature of operations being conducted in theater. COIST functions are performed through an ad hoc arrangement of personnel, equipment, communications, and procedures employed by a company commander in planning, directing, coordinating, and controlling forces and operations in the accomplishment of the company’s assigned mission. Companies do not possess specialized staff personnel to perform this mission and must constitute COISTs out of hide. Regardless of how large or how well manned, the COIST must facilitate the collection, analysis, and dissemination of information both up and down the chain of command. Providing accurate, timely information assists, informs, and enables the commander to make key decisions and effectively manage unit resources. The Army has formally recognized the need for a COIST, and a pending force design update, when implemented, will address this requirement. 6 U.S. UNCLASSIFIED REL NATO, GCTF, ISAF, MCFI, ABCA For Official Use Only COIST HANDBOOK Chapter 2 Company Intelligence Support Team Organization Companies, regardless of function, are currently neither authorized nor staffed for company intelligence support team (COIST) operations. As mentioned in chapter one, a force design update will address this shortcoming. In the meantime, tough decisions regarding manpower and personnel are necessary. Every Soldier or leader involved in COIST operations is one less Soldier or leader who can be sent on patrol, provide security, or man a quick reaction force. That being said, most commanders with combat experience in theater believe the contributions of the COIST are well worth the costs associated with resourcing it. There are multiple ways to man the COIST. However, a good rule to follow is, “If it doesn’t hurt, it’s probably not the right personnel.” The payoff for manning the COIST appropriately is large dividends in the volume, timeliness, and value of information passed to the commander, his subordinates, and leaders to drive operations. The overall goal of the COIST is twofold: • Aids the company commander in his decision making by bringing a fused intelligence picture down to the company. • Assists the battalion (BN) by providing a flow of bottom-up intelligence to higher units. While the COIST is a company asset, its effectiveness is contingent on its ability to fuse diverse forms of information from both inside and outside the company sector into a picture that will aid the company commander in his decision making. The quality and format of the information one COIST provides have a direct impact on the success of its adjacent units and thus these things must be managed from the higher (BN) level. Consequently, the BN intelligence officer (S-2)/COIST relationship is critical to the success of the BN. BN S-2 shops typically have very limited manpower and therefore must set themselves up for success by putting significant effort into the COIST processes. Battalion Intelligence Section The creation of systems whereby the BN receives analyzed intelligence products rather than raw information will reduce the overall workload on the BN analysts and lead to the creation of better intelligence products at all levels. To achieve this effect, the S-2 needs to provide five things to the COIST: • Training • Standing operating procedures (SOPs) • Guidance • Feedback • Advocacy U.S. UNCLASSIFIED REL NATO, GCTF, ISAF, MCFI, ABCA For Official Use Only 7 CENTER FOR ARMY LESSONS LEARNED Training A typical maneuver BN only has school-trained Military Occupational Specialty 35F Intelligence Analysts within the BN S-2 shop. While mobile training teams provide a baseline of training to most COISTs, many Soldiers never attend due to moves within the company, so the S-2 shop must step up to ensure these individuals receive basic analytical training. In addition to basic analyst tasks, S-2 shops owe their COISTs training on aspects of the intelligence fight specific to their particular area of operations (AO). Examples of training would be the following: • Instruction in the BN standard debriefing process. • Classes in the threat groups and enemy tactics, techniques, and procedures (TTP) of a particular AO. • Classes in database search techniques that would be effective in a particular AO (i.e., entity-based searches versus geography-based searches). • Classes in the intelligence, surveillance, and reconnaissance (ISR) assets that operate within the AO. As the analytical skill of the COIST improves, more complicated tasks such as intelligence preparation of the battlefield (IPB), development of enemy courses of action, and writing of company intelligence requirements (IRs) should also be taught. If the BN S-2 takes a hands-off approach to the training of the COISTs, their effectiveness will be greatly diminished upon arrival in the combat zone. SOPs The BN S-2 owes the COIST detailed SOPs on all aspects of COIST operations. Again, the format and quality of information posted by one COIST have a direct impact on the success of adjacent COISTs and thus must be managed from the higher level. The SOPs required generally fall into four broad categories: • Primary, alternate, contingency, and emergency communications • Reporting requirements • Intelligence synchronization products • Databasing and knowledge management guidelines Some common examples of procedures the BN S-2 owes the COIST are the following: • Battalion debrief SOP. • Targeting products SOP. 8 U.S. UNCLASSIFIED REL NATO, GCTF, ISAF, MCFI, ABCA For Official Use Only COIST HANDBOOK • Daily intelligence summary/graphic intelligence summary SOP (or whatever format is used to pass information between company and BN level). • Data entry SOPs for the various Tactical Ground Reporting (TiGR) System functions (significant activities, human intelligence reports, signals intelligence reports, personality entry, place entry, and area cataloging). • SOP for the format of products produced by company-level ISR systems (unattended ground sensors, Raven, integrated communications (ICOM) scanners, Rapid Aerostat Initial Deployment towers/Cerberus towers, and biometric data systems). • SOP for the immediate exploitation and then passage of information gleaned from site exploitation. • SOP for the exploitation and transportation of detainees. • Other SOPs a BN S-2 might determine apply to a specific AO. The BN S-2 must use his understanding of the overall intelligence fight as well as his knowledge of the specific capabilities of various ISR and analytical platforms when developing these SOPs. The basic guideline is the SOPs must be understandable to Soldiers at even the most junior level. They should be written in a way that maximizes the use of digital systems to make the company’s information searchable to adjacent units. Commanders need to recognize the creation of these SOPs is an extensive amount of work for the BN S-2 shop but is necessary to ensure a smooth flow of information throughout the BN sector. Guidance While the COIST works for the company commander, the company is in fact the best intelligence asset in the BN’s possession. As a result, the company will be often tasked to answer BN-level IRs. The information a BN commander needs to be successful can at times be broad and extremely complicated. The S-2 must work to redefine this broad swath of necessary information into clear and specific information requirements (SIR) and then work with the S-3 (operations and training officer) to task these requirements to the appropriate units. Ideally, they will be pushed to the company as part of the BN daily fragmentary order in the form of specific orders and requests (SOR) or intelligence taskings. The S-2’s work does not end here, however, as he must ensure the company tasked with the IRs has a clear understanding of the meaning and importance of the request and then develop an adequate method of tracking the results. His interaction with the COIST will be crucial to ensuring these BN-level IRs are answered in a timely and effective manner. Feedback The BN S-2 owes the COIST clear and useful feedback on all products it produces. COISTs that believe they are operating in a vacuum and no one is looking at the work they present will invariably produce substandard products. Feedback on whether products such as debriefs and area assessments are meeting the intent for U.S. UNCLASSIFIED REL NATO, GCTF, ISAF, MCFI, ABCA For Official Use Only 9 CENTER FOR ARMY LESSONS LEARNED the BN can easily be entered through the comment feature on TiGR but is best offered in a discussion between the S-2 and the COISTs. This discussion usually takes the form of a meeting (either face-to-face or over a digital communications system) between the S-2 shop and COISTs to discuss the information that has flowed into each company sector during the week and also the status of any IRs that have been answered or remain unanswered. The more feedback the COISTs receive on their piece of the intelligence effort, the better the results will be for both the company and the BN. Advocacy The understanding of COIST operations is still at a low level within the Army. Often the positive effects of a successful COIST may be invisible to a company for many months, and the commander and first sergeant may wonder why they have sacrificed four to six Soldiers toward this effort. The S-2, however, should always be looking at the big picture of the BN’s intelligence fight and therefore should always understand the effect of the COIST. The BN S-2 is often the individual who must fight for the most capable Soldiers to be assigned COIST duties. The S-2 must also fight to limit the number of side or distracter taskings that COIST members encounter. Finally, the S-2 will know the origin of effective intelligence and must ensure that company and BN commanders are aware of what successes have resulted from the hard work of the COIST. Only by sharing the successes of effective COISTs can the BN bring about a general understanding of the importance of their efforts. Overall, the successful implementation of COISTs involves extensive effort on the part of the BN S-2. If the S-2 fails to do the required preparatory work, his own effort to effectively utilize the COIST will likely fail. S-2s must put in the required planning to ensure the fused intelligence picture is pushed to the company level. COISTs must understand that no matter what their geographic disposition, their efforts are not isolated, and a failure to implement the guidance and SOPs of the BN S-2 could lead to their own failure as well as a weakening of their adjacent units’ COIST efforts. Commanders at all levels must understand the S-2/COIST relationship to ensure effective flow of intelligence from the lowest levels up, which will ultimately ensure the success of the unit in intelligence-based operations. The company commander is a key player in all aspects of company-level operations. This is especially true when it comes to the structure, manning, and integration of the COIST. The commander and his subordinate leaders can greatly increase the effectiveness of the COIST by selecting the best qualified individuals for this duty. The personnel selected should: • Possess or be able to be granted a secret security clearance. • Possess strong analytical aptitude. • Have an ability to think, speak, and write clearly. • Possess strong computer skills and normal color vision. • Understand battle tracking, and have an ability to organize information. 10 U.S. UNCLASSIFIED REL NATO, GCTF, ISAF, MCFI, ABCA For Official Use Only COIST HANDBOOK • Understand how to work with intelligence system hardware and software (see Chapter 3). • Possess operational experience to understand what information is important and how to present it. It is also important the COIST has a sufficient number of personnel to conduct continuous 24-hour operations. Leaders in the COIST must be vigilant in the following areas to derive the most benefit from the organization: • Enforce the debrief standards. • Enforce priority intelligence requirements (PIRs), SIR, and SOR (commanders cannot allow their IRs to stagnate). • Follow SOPs. • Maintain regularly scheduled communication with higher headquarters’ staff. • Maintain and retain COIST personnel once they have been trained. • Minimize distracter tasks for the COIST. Recommended COIST Organization Manning Chart Six COIST personnel: • One COIST noncommissioned officer in charge (NCOIC) • One analyst • Four Soldiers Figure 2-1 Company Intelligence Support Team Leader/Soldier Responsibilities Company commander responsibilities include the following: • Creates, equips, selects, and trains personnel. • Integrates COIST into all aspects of company-level operations: º Military decision-making process U.S. UNCLASSIFIED REL NATO, GCTF, ISAF, MCFI, ABCA For Official Use Only 11 CENTER FOR ARMY LESSONS LEARNED º Targeting º Patrol briefing and debriefing • Listens and acts on the analyses and recommendations of the COIST. • Allocates space for execution of COIST responsibilities and functions. • Provides guidance and direction on information presentation, and approves PIRs. The COIST NCOIC has the following responsibilities: • Supervises intelligence operations within the company. • Responsible for all COIST actions and operations. • Gives updated enemy threat briefs to patrols prior to start point time. • Ensures COIST members are tasked appropriately and identifies priorities of work. • Ensures priorities are completed and analysts have time and appropriate area to work. • Acts as liaison between the COIST and higher echelon S-2 sections. • Requests BN intelligence and collection assets for company and platoon operations, and synchronizes collection efforts and priorities with the BN S-2. • Assists in the preparation of indicators to satisfy PIRs. • Manages all current and emerging targets, and ensures target packets are created to facilitate servicing of targets. • Recommends to the commander when a target is actionable and what assets are available. • Responsible for and recommends options to the commander on nonlethal fight operations. The COIST analyst is responsible for reading, interpreting, researching, and analyzing intelligence and information pertaining to the company’s operational environment. Additional traits and responsibilities include the following: • Most knowledgeable and informed member of the COIST (debriefs and prebriefs, communicating with the BN S-2 analyst). • Makes recommendations and gives the commander his “best guess” based on information he obtains. • Updates PIRs, SIR, and SOR from the commander. 12 U.S. UNCLASSIFIED REL NATO, GCTF, ISAF, MCFI, ABCA For Official Use Only COIST HANDBOOK The COIST Soldiers’ responsibilities include the following: • Prepare intelligence products to support the commander/company. • Assist in establishing and maintaining systematic, cross-referenced intelligence records and files. • Receive and process incoming reports and messages. • Assist in determining significance and reliability of incoming information. • Assist in integrating incoming information with current intelligence holdings. • Prepare and maintain the situation map. • Assist in the analysis and evaluation of intelligence holdings to determine changes in enemy capabilities, vulnerabilities, and probable courses of action. • Assist in the preparation of order of battle records using information from all sources and the preparation of estimates of enemy unit and organization strengths and capabilities. • Assemble and proofread reports and assist in consolidating them into military intelligence. • Prepare IPB products. • Assist in the preparation of reports on captured enemy material. • Draft periodic and special intelligence reports, plans, and briefings. • Brief and debrief patrols. Materiel To effectively perform its functions, the COIST should be equipped with dedicated computers and access to communications equipment. The COIST can function on two computers but ideally should be resourced with three: one for biometrics (if allocated); one for mapping, personality and event linkage, and event-trend analysis; and one for prebriefs and debriefs via TiGR, if available. Currently the Army resources mapping through Falcon View, the Distributed Common Ground System–Army, or Aeronautical Reconnaissance Coverage Geographic Information System mapping applications; personality linkage through Analyst Notebook, an analyst development tool; and event linkage through Crystal software application. However, units are currently fielding newer, updated software such as Analysis and eXploration of Information Sources Professional (AXIS Pro) (see Chapter 3). U.S. UNCLASSIFIED REL NATO, GCTF, ISAF, MCFI, ABCA For Official Use Only 13 CENTER FOR ARMY LESSONS LEARNED A suggested equipment and materiel list includes: • Equipment: º 3x workstations (2x SECRET Internet Protocol Router [SIPR]/1x Non-Secure Internet Protocol Router [NIPR]) º Laptop computer º AXIS Pro/Analyst Notebook (AXIS Pro is replacing Analyst Notebook) º TiGR º Falcon View º Microsoft Internet Relay Chat (mIRC) or other chat capability software º Microsoft Office Suite • Systems: º Biometric Automated Toolset and Handheld Interagency Identity Detection Equipment º One System Remote Video Terminal º Cellular exploitation/CelleBrite handheld, portable forensic device for cellular phones • Materiel: º Color printer, scanner, and copier (1x SIPR/1x NIPR) º Safe º Secure Voice Over Internet Protocol phone º Digital camera º In-focus projector º Shredder º Maps º Tent, tables, chairs, dry-erase board, power source, lights, and environmental controls (air/heat) 14 U.S. UNCLASSIFIED REL NATO, GCTF, ISAF, MCFI, ABCA For Official Use Only COIST HANDBOOK Location The COIST must stay current on all operations and should be collocated with the company command post, which allows it to communicate directly with the BN S-2 as well as units on patrol. Further, its proximity to radios increases situational awareness. Again, to maintain continued intelligence collection and analysis, the COIST serves as a function of the command post. Do not use the COIST to run the company-level command post. Control measures must be established so sensitive material is only seen by those with appropriate access. The proximity of the COIST to the primary company command post is essential to enable the COIST to have timely situational awareness and always be up to speed on current company activities. The COIST also requires close access to the company decision maker (commander, first sergeant, or executive officer). Figures 2-2 and 2-3 depict a way to lay out a COIST for operations in a tactical environment. The graphics depict what a COIST should be able to produce and disseminate and represent what should be included and displayed on a COIST wall, not how it should be arrayed. The COIST should tailor the location of its products to best suit briefing the individual company and its commander. Figure 2-2. COIST physical layout The analysis area of the COIST is where all the intelligence analysis tools are located so they can be used as efficiently as possible. The briefing area of the COIST is where all the products for the outgoing patrol leader, convoy leader, or commander are consolidated. The area facilitates a focused one-stop location where all available information is displayed and disseminated. U.S. UNCLASSIFIED REL NATO, GCTF, ISAF, MCFI, ABCA For Official Use Only 15 CENTER FOR ARMY LESSONS LEARNED Legend: COA: Course of action EVENTEMP: Event template FCIR: Friendly critical information requirements HVIL: High-value individual list SITEMP: Situation template SOI: Sphere of influence TQ: Tactial questioning Figure 2-3. COIST product display The COIST should establish a patrol tracker separate from the operations patrol tracker. The patrol tracker is designed to assist the COIST in identifying patterns and TTP the company is creating. During the patrol prebrief, the briefer should recommend certain actions to the patrol leader, such as leaving at a different time or taking a different route. Conclusion Intelligence-driven operations have become a cornerstone of the contemporary counterinsurgency fight. Senior tactical commanders are requiring more of their subordinates. Accordingly, companies are establishing COISTs. The COIST mission, function, and resource requirements are known or can be determined; however, its success in combat will be limited if the requirements are not adequately addressed. The secret to its success is commander involvement, leadership, and participation. The commander’s mission and intent are critical to the COIST as they provide PIRs, SIR, SOR, and indicators. Additionally, the commander must establish clear priorities to assist the COIST in the execution of his intent. The commander will set the tone by selecting, training, and assigning the correct personnel for the job and by integrating the COIST, its capabilities, analyses, and recommendations into operations and planning. 16 U.S. UNCLASSIFIED REL NATO, GCTF, ISAF, MCFI, ABCA For Official Use Only COIST HANDBOOK Chapter 3 Company Intelligence Support Team Systems and Tools To accurately conduct predictive analysis on enemy activity, the company intelligence support team (COIST) must accurately track and analyze enemy activity. In addition to tracking events, the COIST must be able to display and brief the information to the commander and the unit. There are many methods for collecting and tracking data on the enemy and events. The data must be tracked daily; however, whatever the method chosen to conduct analysis, the COIST must conduct weekly and monthly event analyses to determine patterns of enemy events (i.e., time, place, and type of activity). The COIST is responsible for collecting and archiving data at the company level for use at all echelons. It also maintains a local database for use in company operations and planning. Additionally, given the capability, the COIST can search existing databases and update the company database or gather information to fill intelligence gaps. To manage company information, the COIST must establish a filing system for information gained by the unit. The COIST will have access to several systems and tools to aid in the collection, analysis, reporting, and dissemination of information. These systems and tools can help build an accurate intelligence picture within the company area of operations (AO). Some of these tools are just now becoming common at the company level, while others are traditional skills and systems that have been available for some time. Systems and Tools Digital cameras and photographs The digital camera can be an outstanding surveillance and recording tool for patrols. A patrol armed with a digital camera can bring back dozens of images to the COIST that provide detailed data and additional information and insight. For example, operational use of digital cameras has proven valuable to identify both friendly and enemy key personnel. Figure 3-1 is an example photo that would come from the patrol’s photograph log. The photograph and marginal information should be updated as soon as possible after each patrol when practical. Note that in the example, the date-time group, unit identifier, and Military Grid Reference System (MGRS) are on the photograph. The direction and photograph series number are also printed on the photograph. The narrative that accompanies this digital photograph could read as follows: Platoon Sergeant Smith: Picture of Alpha Company western ECP (entry control point). The al-Nafar tribe is protesting the lack of water in the town. The police chief and his lieutenants are being escorted into the company reception area. The main instigator of the protest is circled and is believed to be Abu Haneffa. U.S. UNCLASSIFIED REL NATO, GCTF, ISAF, MCFI, ABCA For Official Use Only 17 CENTER FOR ARMY LESSONS LEARNED Figure 3-1. Example digital photo Digital cameras can also provide timely images of new graffiti, posters, and signs for translation/interpretation when on-scene linguists are not with the patrol. For example, this collection tool provides significant insight to a report that might have otherwise read something like, “New graffiti noted within neighborhood XX along route YY.” Upon analysis of the words and context, the graffiti may give warning of future danger or a hint of a change in mood—positive or negative—of the populace. Reconnaissance and surveillance teams can show a commander actual color photographs of his objective. In addition to greatly enhancing detailed planning, an exact image can be passed along to the battalion (BN) for further exploitation. To support this mode of collection, the COIST should establish a picture log. This log will have a company/patrol identifier with date, picture number, and location using the MGRS. It also indicates where the photograph was taken, general direction of the photograph, and any other amplifying remarks. The picture number may have a unit coding system so other people can easily identify which unit took the photograph. Photographs must be secured and carefully controlled. COISTs must treat photographs as sensitive information with strict controls and guidance for their handling. For example, if the object of a photograph knows that he is being collected against, he may relocate. This may disrupt other collection methods in place such as human intelligence (HUMINT) and signals intelligence (SIGINT) that are not under the control of the COIST. Additionally, there is always the possibility that our own photographs could somehow be used for propaganda against us or to possibly reveal some of our tactics, techniques, and procedures (TTP). Video cameras Although it is not as easy to carry as a digital camera, a video camera can record exactly what happened during significant events witnessed by Soldiers during the conduct of routine operations and patrols. Instead of relying solely upon a verbal debrief, a patrol can show the COIST exactly what happened and review each event in sequence. This data can also be easily passed on to the higher headquarters in its original format, ensuring the analysts at the BN, brigade combat team (BCT), or division level can see everything just as Soldiers on the ground saw it. 18 U.S. UNCLASSIFIED REL NATO, GCTF, ISAF, MCFI, ABCA For Official Use Only COIST HANDBOOK Unmanned aircraft systems (UAS) Figure 3-2. Raven The Raven is small and can be transported easily in three small cases that fit into a ruck sack. The crew can bring it with them and operate wherever the patrol goes. The Raven has three different cameras that attach to the platform: an electrical optical camera that sends data either through a nose camera or a side camera, an infrared (IR) camera, and a side-mounted IR camera. The IR technology is still too big to fit into the nose section of the platform. The camera does not have a zoom feature and is unable to lock on a target but provides enough resolution to show someone carrying a weapon. The Raven has about 45 to 60 minutes of flight time on one battery. The kit comes with spare batteries and a charger that plugs into a high-mobility multipurpose wheeled vehicle, so the operator can land it, pop in a spare battery, and get it back in the air. The Raven can be launched in just minutes by hand into the air like a model airplane. It lands itself by auto-piloting to a near hover and dropping to the ground without needing landing gear or carefully prepared landing strips. Since it is launched and recovered in this manner, it does not require elaborate support facilities and is ideally suited to a forward-deployed unit. Its automated features and Global Positioning System (GPS) technology also make it simple to operate, and it requires no specially skilled operators or in-depth flight training. U.S. UNCLASSIFIED REL NATO, GCTF, ISAF, MCFI, ABCA For Official Use Only 19 CENTER FOR ARMY LESSONS LEARNED Figure 3-3. Shadow The Shadow UAS is the brigade commander’s primary reconnaissance, surveillance, and target acquisition asset. The Shadow is equipped with an electro-optical/IR camera. It has a range of approximately 100 kilometers, can fly for up to 4 hours, and operates at altitudes between 6,000 and 10,000 feet. One advantage of the Shadow is that it is an in-house intelligence, surveillance, and reconnaissance (ISR) asset that can provide a BN or BCT commander with tactical overwatch whenever needed. The COIST can request use of or information from this BCT-level asset through the BN S-2 as part of the company ISR plan. Additional COIST intelligence systems • One System Remote Video Terminal (OSRVT): The OSRVT is an innovative modular video and data system that enables warfighters to remotely downlink live surveillance images and critical geospatial data directly from a joint operations tactical UAS. The OSRVT has the ability to capture all UAS platforms regardless of who tasked them, which means that with the OSRVT a COIST can watch footage of any area that a platform is observing as long as the OSRVT and the asset are linked up digitally. The OSVRT is also small enough to be vehicule-mounted, enabling the commander on the objective to receive real-time information. • Tactical Ground Reporting (TiGR) System: TiGR is a Web-based application that allows Soldiers to download information into one program. TiGR is the main reporting and database tool for the COIST. It allows for flattening networks and provides situational awareness across the BN and BCT operational environment. The intelligence can include photographs Soldiers have taken with digital cameras, observations Soldiers have made and written in simple text, or detailed maps of the areas gathered by GPS devices. Before leaving on patrol, Soldiers can study high-resolution satellite imagery of what routes they will be taking. Icons for roadside bombs, ambushes, or weapons caches populate the map so Soldiers do not have to wade through enormous text files. They can click on a roadside bomb icon, for example, to see if there is a picture showing where the bomb was hidden, how it was disguised, and any TTP related to the specific device. 20 U.S. UNCLASSIFIED REL NATO, GCTF, ISAF, MCFI, ABCA For Official Use Only COIST HANDBOOK • Analysis and eXploration of Information Sources Professional (AXIS Pro): This is the system that is replacing Analyst Notebook and is installed on Distributed Common Ground System–Army (DCGS–A) systems. It performs many of the same functions as Analyst Notebook (e.g., link diagrams) but is more user friendly because it reduces the amount of time analysts spend on data input. AXIS Pro is a visualization tool. It allows analysts to find data of interest, organize and refine the results, and then visualize the results and detect patterns. AXIS Pro also allows the analyst to manage data through visualization; AXIS Pro automatically loads new data as needed, freeing the analyst from the need to perform additional searches, import extra data, or build case files. AXIS Pro provides a two-way connection to multiple data sources. The analyst can build link diagrams using information from multiple data sources and then create, edit, or delete that information and add changes directly to the data source. AXIS Pro provides a simple multi-intelligence analysis toolset. AXIS Pro extends AXIS core features to provide integrated analysis, data management, and intelligence visualization capabilities. AXIS Pro aids the analyst in the process of creating intelligence from large amounts of information. AXIS Pro base capabilities include link, temporal, pattern, and geospatial analysis tools; net centric alarm and alerts; automated entity and relationship extraction from text documents; and an integrated Web portal for information searching and sharing. Additionally, to facilitate interoperability, AXIS Pro comes standard with adaptors for plotting information to additional maps, importing and exporting to both Microsoft Excel and other link analysis tools, and can be configured to work with structured query language servers. AXIS Pro can also be customized to work with other data sources. • Document and media exploitation (DOMEX) and cellular exploitation (CELLEX): DOMEX capabilities at COIST level are extremely limited. Beyond limited on-scene analysis for rapid decisions or targeting, the COIST must forward DOMEX data and material to a higher-level headquarters where DOMEX can be conducted. The COIST should know how to request and access analyzed DOMEX data. COISTs will have CELLEX kits and possess the capability to conduct limited CELLEX. DOMEX will support a wide range of intelligence activities to include all-source analysis, open-source exploitation, HUMINT, SIGINT, geospatial intelligence, and measurement and signature intelligence. DOMEX reporting and analysis are considered intelligence products. • Combined Information Data Network Exchange (CIDNE): CIDNE is a secure Internet host site that contains an engagement tool for tracking three types of entities: people, facilities, and organizations. Additionally, CIDNE is the primary means by which HUMINT collection team (HCT) reporting is fused into the theater intelligence database (BCT/HUMINT officer [S-2X]/military intelligence company/HCT). The underlying principle behind CIDNE is that information is only useful when it is readily available at the right time and place to support decision makers. Often decisions in the operational environment are made without the benefit of critical information that may exist but is not operationalized and therefore not available to the decision maker. CIDNE captures and correlates data and then makes that information and its relationships U.S. UNCLASSIFIED REL NATO, GCTF, ISAF, MCFI, ABCA For Official Use Only 21 CENTER FOR ARMY LESSONS LEARNED available to other systems as well as to CIDNE users. The interfaces to other systems include a complete set of Web services based on industry standards. TiGR, addressed above and which the COIST will have, is capable of pulling and displaying CIDNE information. • Ground Movement Target Indicator (GMTI) Tracking: Tracking can be done using GMTI-type indicators that can observe all the objects moving in the area of interest. GMTI measurements supplied by the sensor are assumed to belong to the road network. On the basis of this assumption, several techniques have been studied to take this information into account. GMTI products should be requested from the brigade S-2 through the BN S-2 as part of the company ISR plan. The COIST does not have the capability to receive and interpret direct GMTI feeds. • Microsoft Internet Relay Chat (mIRC) (or Jabber chat): mIRC is a system that allows the COIST to both monitor multiple situations at once and communicate instantly across the battlefield with anyone who is connected. Chat is a primary means of communicating in theater and is the most common means for communicating with theater-level assets, such as full-motion video. mIRC is similar to any instant messaging application found on the Internet. COIST personnel can monitor a number of chat rooms depending on their preferences. The COIST needs someone to monitor mIRC at all times because of the time-sensitive information that moves across it. Monitoring mIRC will not be the only job this individual performs, but the assigned Soldier will be responsible for checking it constantly. It is suggested the Soldier monitoring mIRC has a maximum of five windows on his computer open at any one time to ensure information overload does not occur. Many units are beginning to transition to Jabber chat—both systems have similar capabilities. • Biometric Automated Toolset (BAT) and Handheld Interagency Identity Detection Equipment (HIIDE) systems: BAT collects fingerprints, iris scans, facial photos, and biographical information on persons of interest into a searchable database. It is used for tactical operations, detainee operations, base access, improvised explosive device (IED) forensics operations, and local hire screening and intelligence. HIIDE collects and matches fingerprints, iris images, facial photos, and biographical contextual data of persons of interest against an internal database. HIIDE is interoperable with BAT for biometrics data exchange back to the Department of Defense biometrics data repository. Intelligence, Surveillance, and Reconnaissance Request Procedures When the COIST requests ISR assets, it should request a capability and not an asset (i.e., “A company requests full-motion video,” not “I need a Shadow/Predator”). The reason for this is that if the COIST requests an asset and that particular asset is not available, the COIST will not receive any support. If the COIST requests a capability (such as IR or full-motion video), it will get support from whatever asset is available with that capability. Additionally, units should include a task and purpose and how/when the information needs to be collected. All ISR requests will be sent up to the BN, consolidated, and, if necessary, requested from brigade. The COIST needs to be as specific as possible when 22 U.S. UNCLASSIFIED REL NATO, GCTF, ISAF, MCFI, ABCA For Official Use Only COIST HANDBOOK explaining why it needs a particular capability. The demand for ISR assets is extremely high, and the COIST needs to be able to convince higher headquarters what it needs is a priority and all other organic assets have been exhausted. Maps There are several environments where standard 1:50,000 maps or even satellite imagery collected years ago are insufficient, inaccurate, or simply not available. The COIST can assist Soldiers and patrols by requesting the most updated map and imagery data through the BN S-2. Additionally, Soldiers operating in these areas will instinctively scout them to increase their familiarity with new surroundings and must record the information they find and report it for appropriate dissemination (i.e., within the company as well as to higher and adjacent units). They do this by improving either existing maps or creating usable sketch maps of key areas. Then, to prepare units that may have to patrol or fight in this area in the future, the COIST should update its maps of the area and disseminate this information up, down, and laterally. Maps can be updated in TiGR, and updates can be viewed by anyone with TiGR access. Sketch maps: overlays This basic map skill should be known and practiced at the squad level. A Soldier can produce an adequate sketch map using a sheet of paper, pencil, straight edge, and any known reference point. The process can be as simple as tracing grid lines from an existing map and adding details such as new trails, bridges, or anything of importance that is not on the issued map. For example, a 1:50,000 map may not contain a series of irrigation canals that severely restrict cross-country mobility alongside an important main supply route. When this is known, the COIST might designate this location as a potential site for future enemy ambushes. Graph paper is particularly useful for creating sketch maps. In this case, a patrol can be dispatched to the area with the current map, paper and pencils, straight edge, and other tools such as the Precision Lightweight GPS Receiver, Defense Advanced GPS Receiver, compass, and graph paper and sketch in the details about the irrigation canals and bypass routes. The COIST can then reproduce this sketch map on overlays on separate sheets of paper for dissemination within the company and to higher and adjacent units. The next step is to update the maps within the company command post. Field sketches The field sketch is closely akin to a sketch map, but in the absence of a digital camera, it will include sketches of an objective, key facility, or other important area to aid commanders in planning. An example would be an observation post producing a sketch of a compound suspected of containing enemy forces. This sketch can be given to the commander to identify details that require additional planning, aid the assault force in identifying the target building, and possibly even save time by eliminating the need for a full leader’s reconnaissance. Field sketches are obviously not as useful as digital photographs in terms of presenting a picture and they are certainly more difficult to disseminate, but they are another tool available for collectors to pass on information to those who need it. U.S. UNCLASSIFIED REL NATO, GCTF, ISAF, MCFI, ABCA For Official Use Only 23 CENTER FOR ARMY LESSONS LEARNED Conclusion The COIST will have access to several systems and tools to aid in the collection, analysis, reporting, and dissemination of information. These systems and tools can help to build an accurate intelligence picture within the company AO. However, to be used effectively and as significant enablers, Soldiers and leaders assigned to the COIST must be familiar with their operation, characteristics, and capabilities. 24 U.S. UNCLASSIFIED REL NATO, GCTF, ISAF, MCFI, ABCA For Official Use Only COIST HANDBOOK Chapter 4 Company Intelligence Support Team Battle Rhythm Battle rhythm and operational tempo (OPTEMPO) are critical aspects of both command post (CP) and company intelligence support team (COIST) operations. An established, effective, and understood battle rhythm assists in efficiency and shortens the time required to share information. The commander is responsible for establishing the COIST battle rhythm. Although the purposes and missions of the CP and the COIST are different, the two entities are collocated. Even with a necessary and clear delineation of duties and responsibilities, some overlap and redundancy will occur between the CP and the COIST. This potential overlap occurs primarily because at the company level commanders do not have staffs; therefore, the company battle staff becomes those personnel in the unit who operate the CP and the COIST. This chapter begins by looking at the overall company battle rhythm and then focuses on COIST and intelligence-specific considerations. Successful continuous operations at the company level are more demanding than at higher-level organizations. The unit requires a tactical standing operating procedure (SOP) allowing rest, especially for critical personnel. At company level, the commander and first sergeant will find it very demanding to try to rest. Their rest plan must be a priority for the organization to be led effectively and for their units to be successful on the battlefield. The cycle of recurring events within a CP/COIST focuses the leaders and Soldiers on meeting information and action requirements. Company personnel are normally required to attend battalion (BN) and company recurring meetings, which has an impact on company CP/COIST operations and schedules and must be incorporated into the small unit’s battle rhythm. Examples of recurring events include the following: • Shift changes • Battle update briefings to the commander • BN battle updates without the commander • BN targeting meetings • BN reports • BN commander’s collaborative sessions • Company CP officer in charge (OIC) and noncommissioned officer in charge (NCOIC) shift change briefings and collaborative sessions The company CP and COIST OIC and NCOIC must achieve battle rhythm for updating and viewing information and understanding how to use it to affect operations. A well-established battle rhythm aids the commander and leaders with the CP and COIST organization, information management and display, decision making, and fighting the battle. Battle rhythm demands careful planning and design. Many competing demands must be deconflicted. Even subordinate platoons U.S. UNCLASSIFIED REL NATO, GCTF, ISAF, MCFI, ABCA For Official Use Only 25 CENTER FOR ARMY LESSONS LEARNED and sections affect a company battle rhythm based on their needs and unit procedures. The company CP and COIST should be staffed for 24-hour operations; however, the company must also conduct cyclical missions. SOPs establish methods of ensuring the right personnel are available for either cyclical or 24-hour operations. Regardless of the method used, practice during exercises will determine the strengths and weaknesses of headquarters personnel for CP and COIST operations and the training required for additional personnel who may be used to staff the CP and COIST during continuous or sustained operations. Such knowledge allows leaders to focus on the critical areas and personnel requiring additional training. In planning, company and COIST leaders must consider battle rhythm requirements of subordinate platoons, sections, and squads. Depending on the situation, the company may schedule missions that allow platoon or section/squad rotations to maintain their battle rhythm. Absence of Battle Rhythm Without procedures establishing battle rhythm, leaders and units reach a point of diminished returns. This point typically occurs between 72 and 96 hours of continuous operations. As leader fatigue sets in, information flow, planning process, execution, and sustainment suffer, often greatly. Symptoms of diminished battle rhythm include the following: • Leader fatigue • Leaders not fully aware of critical decision points • Leaders not available at critical decision points • Disjointed timelines between various levels of command Presence of Battle Rhythm Battle rhythm allows units and leaders to function at a sustained level of efficiency for extended periods. Effective battle rhythm permits an acceptable level of leadership at all times. It can focus leadership at critical points in the fight or during particular events. Procedures and processes facilitating efficient decision making and parallel planning are critical to achieving battle rhythm. Every component of battle rhythm contributes uniquely to sustained operations. Training It is difficult, if not impossible, to establish battle rhythm while simultaneously conducting operations. Preplanning makes battle rhythm happen. Planning, preparing, and training before deployment lay a solid foundation for viable battle rhythm during operations. Commanders must ensure all company personnel are trained on CP setup and operations and they understand the team concept required to conduct CP and COIST operations during combat operations for extended periods. Additionally, company commanders must coordinate with BN staffs during training to deconflict staff operations and requirements counterproductive to the company battle rhythm. 26 U.S. UNCLASSIFIED REL NATO, GCTF, ISAF, MCFI, ABCA For Official Use Only COIST HANDBOOK Battle Rhythm Elements Battle rhythm is a multifaceted concept that includes the following elements: • Sleep/rest plans • Trained second- and third-tier leadership in CPs and COISTs • Synchronized upward multiechelon timelines • Parallel planning • Established processes and SOPs Command Post Personnel Depth Established processes and SOPs relieve many antagonistic effects of extended operations. SOPs that establish and maintain battle rhythm by facilitating routine decisions and operations are a step in the right direction. Soldiers trained to act appropriately in the absence of leaders or orders can relieve commanders and leaders of many of the time-consuming tasks that rob them of essential rest. Examples of tasks noncommissioned officers (NCOs) and junior officers can accomplish for the commander include the following: • Battle summaries and updates during a fight • Intelligence updates before, during, and after a battle • Sustainment updates before, during, and after a battle • Updates to the next higher commander • Shift change briefings Noncommissioned Officer and Junior Officer Responsibilities At the company level, all personnel are critical to the success of the operation and provide valuable contributions. It is imperative commanders ensure each Soldier understands the importance of even the most menial tasks, such as CP security and tactical operations center setup and teardown. Given the amount of personnel in a company, 24-hour operations, and force protection requirements, commanders must utilize all personnel available to successfully accomplish CP and COIST operations. The improper use of personnel produces the following results: • Key leaders become exhausted. • CP and COIST operations-trained personnel become exhausted. • The initiative of trained subordinates is stifled, and the incentive to train is diminished. U.S. UNCLASSIFIED REL NATO, GCTF, ISAF, MCFI, ABCA For Official Use Only 27 CENTER FOR ARMY LESSONS LEARNED The following techniques ensure proper use of personnel: • Appropriate tasks are assigned to junior NCOs and specialists. • Effective training and SOPs instill trust in officers and confidence in junior NCOs and specialists. • Effective command guidance conveys to the company that the operation is a team effort and all personnel available contribute to the effort. Continuous Operations and Timelines Synchronization Timelines for the operation at hand must allow for not only the next operation but also extended continuous operations. Synchronized, multiechelon timelines assist units in achieving battle rhythm. If units do not address critical events at least one level up and down, disruption results. An example of an unsynchronized timeline is a BN rehearsal that conflicts with platoon precombat inspections or other events in its internal timeline. Lower echelon units as well as platoons and sections seldom recover from a poor timeline directed by a higher headquarters. Company commanders must coordinate with their BN staffs on developing SOPs that include planning, rehearsal, and execution timelines one level below BN to prevent these conflicts. Standing Operating Procedures Utilization SOPs must be practiced and reviewed during professional development and sergeants’ time. The existence of an SOP will not resolve troop-leading challenges unless the SOP is practiced often and internalized by unit members. Checklists are critical, as many leaders will often find themselves rushed, physically fatigued, distracted, and deprived of sleep. Checklists ensure each step is considered even when leaders are exhausted. Company Intelligence Support Team-Specific Battle Rhythm The COIST must establish an internal SOP and battle rhythm that outline both recurring cyclic events, such as meetings and shift changes, and also incorporate the intelligence battle rhythm of its higher headquarters. While the exact times and requirements may vary from unit to unit, the following outline can be used as a baseline template to assist companies in developing a predictable, routine, and sustainable tempo to COIST operations: • Daily: º Facilitate and collect patrol debriefs (senior COIST Soldier). º Conduct mission prebriefings and debriefings for patrols and operations (COIST analysts). º Review and analyze patrol debriefs (COIST OIC/NCOIC). º Conduct data processing, and update maps, templates, and graphics (COIST analysts). 28 U.S. UNCLASSIFIED REL NATO, GCTF, ISAF, MCFI, ABCA For Official Use Only COIST HANDBOOK º Supervise detainee packets (COIST OIC/NCOIC). º Provide deception recommendations as required (COIST OIC/NCOIC). º Exchange data with the BN S-2 and brief the commander (COIST OIC/NCOIC). º Collect, report, and disseminate through pertinent channels site exploitation and weapons intelligence (senior COIST Soldier). º Update all trackers and graphs (senior COIST Soldier). º Update intelligence board for outgoing patrols (senior COIST Soldier). º Contact adjacent units for intelligence sharing (COIST OIC/NCOIC). º Update biometric information. • Weekly: º Analyze week’s events (COIST OIC/NCOIC). º Conduct pattern analysis for the last 30 days (COIST analysts). º Refine enemy situational template (COIST analysts). º Forecast enemy actions (COIST analysts). º Identify potential targets (COIST analysts). º Identify and update company, troop, and battery named areas of interest (senior COIST Soldier). º Update company, troop, and battery priority information requirements (COIST OIC/NCOIC). º Update sewer, water, electricity, academics, trash, medical, and security; and area, structures, capabilities, organizations, people, and events assessments (COIST analysts). º Brief commander (COIST OIC/NCOIC). • Monthly: º Analyze month’s events (COIST OIC/NCOIC). º Analyze patterns for the last 30 days (COIST OIC/NCOIC). U.S. UNCLASSIFIED REL NATO, GCTF, ISAF, MCFI, ABCA For Official Use Only 29 CENTER FOR ARMY LESSONS LEARNED º Produce detailed monthly intelligence summary (INTSUM) (COIST OIC/NCOIC). º Brief company leadership (COIST OIC/NCOIC). Intelligence Battle Rhythm The intelligence battle rhythm is designed around the brigade combat team (BCT) and BN battle rhythm. The intelligence battle rhythm will be adjusted as required by theater and operational requirements. The following schedule can be used as a baseline template to inform and assist companies in planning for and developing a predictable and recurring intelligence: • Company/BN: 0800 – Shift change slides information cutoff (S-2) 0830 – Shift change slides due to BN battle captain (CPT) 0830 – Company fusion cell (CFC)/S-2 net call via Adobe Connect 0900 – BN shift change 1000 – BN battle update assessment (BUA)/staff synchronization (synch) meeting (S-2) 1300 – BN intelligence, surveillance, and reconnaissance (ISR) synch meeting (S-2, CFC) 1700 – BN collection planning session (S-2, CFC) 1800 – Company collection plan due to BN (CFC) 1900 – CFC INTSUM information cutoff (CFC) 2000 – CFC INTSUM due to BN 2000 – Shift change slides information cutoff (S-2) 2030 – Shift change slides due to BN battle CPT 2030 – BN INTSUM posted 2100 – BN shift change • Brigade (BDE)/Sensitive compartmented information facility (SCIF): 0800 – BN shift change slides information cutoff 0800 – SCIF shift change slides information cutoff (SCIF NCIOC, operations, fusion, S-2X, collection management and dissemination [CM&D], and signals intelligence [SIGINT]) 30 U.S. UNCLASSIFIED REL NATO, GCTF, ISAF, MCFI, ABCA For Official Use Only COIST HANDBOOK 0900 – BN shift change slides due to BDE 0930 – BDE shift change 0930 – BDE shift change slides due to SCIF 1000 – SCIF shift change 1030 – S-2 conference call via Adobe Connect 1100 – BCT BUA/staff synch meeting (S-2) 1400 – BDE ISR synch meeting (S-2, ISR, targeting, and military intelligence company) 1530 – BCT daily targeting meeting (S-2, ISR, and targeting) 1830 – BN collection plan/asset status update to BCT (ISR) 1830 – SCIF huddle (SCIF NCIOC, fusion, S-2X, CM&D, and SIGINT) 1900 – BN INTSUM information cutoff 2000 – BN shift change slides information cutoff 2000 – SCIF shift change slides information cutoff (SCIF NCIOC, operations, fusion, S-2X, CM&D, and SIGINT) 2030 – BN INTSUM due to BDE (S-2) 2100 – BN shift change slides due to BDE 2130 – BDE shift change 2130 – BDE INTSUM posted 2130 – BDE shift change slides due to SCIF 2200 – SCIF shift change Figure 4 illustrates the company-level intelligence cycle. U.S. UNCLASSIFIED REL NATO, GCTF, ISAF, MCFI, ABCA For Official Use Only 31 CENTER FOR ARMY LESSONS LEARNED Legend: AIF: Anti-Iraqi forces CEC: Counter explosive cell CMO: Civil-military operations CO: Company FSO: Fire support officer HVI: High-value individual info: Information INTS: Intelligence summary IO: Information operations ISF: Iraqi Security Forces ops: Operations PL: Platoon Rep: Representative RTE: Route THT: Tactical HUMINT team TQ: Tactical questioning Figure 4. Company-level intelligence cycle Conclusion Successful continuous operations at the company level are more demanding than at higher-level organizations due to available personnel and mission requirements. Battle rhythm and OPTEMPO are critical aspects of both company CP and COIST operations. Although the purposes and missions of the CP and the COIST are different, the two entities are collocated. Even with a necessary and clear 32 U.S. UNCLASSIFIED REL NATO, GCTF, ISAF, MCFI, ABCA For Official Use Only COIST HANDBOOK delineation of duties and responsibilities, some overlap and redundancy will occur between the CP and the COIST; therefore, the company battle staff becomes those personnel in the unit who operate the CP and the COIST. The relationship between OPTEMPO, battle rhythm, and the unit intelligence cycle necessitates the development of SOPs and tactics, techniques, and procedures that account for and encompass all COIST and intelligence-specific considerations. U.S. UNCLASSIFIED REL NATO, GCTF, ISAF, MCFI, ABCA For Official Use Only 33 COIST HANDBOOK Chapter 5 Integration of Company Intelligence Support Team Operations: Platoon Through Brigade For the company intelligence support team (COIST) to be effective, its activities, analysis, and reporting must be carefully integrated from bottom to top and from top to bottom. Integration encompasses open, two-way information exchange from the platoon level to the brigade combat team (BCT) level. There should be no confusion as to if or how the COIST replaces or negates the need for battalion (BN)- and BCT-level intelligence sections. It absolutely does not! Instead, the COIST is most effective when its work is complementary, supporting, and coordinated with the efforts of existing higher echelon intelligence sections’ planning and collection efforts. Although intelligence, synchronization, and reconnaissance (ISR) efforts are undertaken at all levels—company to BCT—one of the primary intelligence-gathering vehicles available at the small-unit level is the patrol. For this illustration of COIST through BCT integration, the patrol will be used to illustrate the connections necessary to achieve complete integration. Intelligence cells reside at all levels—from BCT to company. At the BCT level, there will be an S-2 section that conducts detailed intelligence analysis of the BCT area of operation (AO). Additionally, the BCT staff serves as a conduit or link to echelon-above-BCT intelligence-gathering systems and platforms. Based on the BCT’s mission and commander’s intent, the S-2 section in conjunction with the entire BCT staff develops an ISR plan or matrix to answer the commander’s priority intelligence requirements (PIRs), assist in targeting, and gather intelligence and indicators to drive tactical operations and orders to subordinate units. These orders and operations can take the form of specific information requirements (SIR) and specific orders and requests (SOR). The SIR and SOR are then allocated against available collection assets, which can be from higher echelons, organic, or passed to subordinate units. In some configurations (e.g., Stryker BCT) the BCT may also have a reconnaissance, surveillance, and target acquisition squadron with additional assets and expertise to assist in intelligence analysis as well as for planning and conducting ISR. The BN will also have an S-2 section. This section is not as robust as the BCT-level S-2 section, but it does have the capability to conduct detailed intelligence preparation of the battlefield (IPB). The BN S-2 section in conjunction with the entire BN staff develops an ISR plan or matrix to answer higher and BN-level PIRs and assist in targeting and the gathering and analysis of available intelligence to drive tactical operations and orders to subordinate companies and specialty platoons. As at the BCT level, BN PIRs can be addressed by requesting higher-echelon assets—using organic BN assets such as scout and sniper platoons—or they can be passed to subordinate companies in the form of maneuver orders, SIR, and SOR. At the company level there is no organic organizational intelligence analysis section, but as stated throughout this handbook, most company-size elements are organizing COISTs to fulfill this requirement. Within its capability, the COIST conducts IPB and assists the commander in the development of company-level PIRs and a company level-ISR plan. This plan will support the collection of information on the company commander’s PIRs as well as incorporating the PIRs, SIR, SOR, and maneuver orders of the BN and BCT commanders. The SIR and SOR U.S. UNCLASSIFIED REL NATO, GCTF, ISAF, MCFI, ABCA For Official Use Only 35 CENTER FOR ARMY LESSONS LEARNED developed can then be addressed by requesting ISR assets from higher echelons or by using company-level organic assets. The PIR and ISR plans from BCT to company are linked as PIRs, SIR, and SOR. Maneuver orders from higher commanders can become company-level PIRs, SIR, SOR, or tasks. At the company level these requirements can be passed to patrols during patrol prebriefings and collected back at patrol debriefings and reported to higher headquarters. To be effective, the COIST must understand how to conduct effective patrol briefs and debriefs and report, analyze, and exploit the information and intelligence derived from these reports to develop enemy estimates, conduct pattern/predictive analysis, and support the targeting process. These processes and systems must be established and trained on to facilitate quick reporting and enable both company and higher-level organizations to conduct timely intelligence-driven operations throughout the AO. It is essential at the platoon level that leaders and Soldiers debrief their respective intelligence sections/teams and provide information for the development of refined intelligence in support of the ISR efforts at company, BN, and BCT levels to ultimately answer their commanders’ PIRs. The patrol brief is the key delivery method for sharing intelligence with or on adjacent and subordinate units prior to departing the forward operating base, combat outpost, or joint security site. Depending on terrain and where the company headquarters is located, the patrol brief can be issued by either the BN S-2 or the COIST. Intelligence shared during a patrol brief should not be limited to lethal targeting or effects but should also focus on nonlethal effects. As the counterinsurgency (COIN) environment matures, it is essential that commanders and leaders focus on nonlethal targeting and the operational environment (political, military, economic, security, social, information, infrastructure, physical environment, and time [PMESSII-PT]) or area structures, capabilities, organizations, people, and events (ASCOPE). During the patrol brief, COISTs and S-2s must submit requests for information (RFIs) and SOR to the patrolling unit. These RFIs and SOR allow Soldiers the opportunity to answer intelligence gaps and assist in answering the commander’s PIRs. Refined collection focus aids in the support of ISR plans. The ISR plan/matrix should be continually updated as intelligence is collected. Additionally, it is crucial that units have a task and purpose and understand the reporting requirements and SOR they are being tasked with. The patrol brief should be thought of as an abbreviated IPB brief. The S-2/COIST conducting the prebrief must: • Describe the effects of terrain and weather. • Define the operational environment. • Describe operational effects. 36 U.S. UNCLASSIFIED REL NATO, GCTF, ISAF, MCFI, ABCA For Official Use Only COIST HANDBOOK • Evaluate the threat. • Determine the threat courses of action. Key intelligence items to discuss during the patrol prebrief include the following: • Last 24–48 hours significant activities in the area of responsibility (storyboards or graphic intelligence summary). • Route status. • ISR collection assets and priorities. • Current assessments and future expectations. • High-payoff target list (HPTL) (distribute and brief). • Updates on key personalities (spheres of influence [SOI]), groups, events, and threats). • Collection priorities (ISR matrix and intelligence synchronization matrix) in support of the commander’s PIRs. • Be-on-the-lookout list. • Updated ISR matrix (intelligence requirements, SIR, SOR, named areas of interest [NAIs]) in support of the commander’s PIRs. • Updated biometric files for the Biometric Automated Toolset (BAT) and Handheld Interagency Identity Detection Equipment (HIIDE) systems at patrol level. • Updated graphics (routes, imagery, objectives, NAIs, and targeted areas of interest [TAIs]). • Updated assessments of the operational environment in regard to PMESSII-PT and ASCOPE. Patrol debrief tactical ground reporting At the conclusion of a mounted or dismounted patrol, leaders and Soldiers must debrief their respective unit and intelligence counterparts to ensure information and intelligence are not lost. The patrol leader along with his entire patrol must debrief every piece of information even though it might not seem important or of intelligence value. Routine information often provides indicators of the operational environment and is decisive in the targeting process (lethal/nonlethal). General village assessments and debriefs of a key leader engagement (KLE) with an SOI allow the company commander and his COIST or the BN commander’s staff the ability to focus their efforts in developing the target synchronization matrix and refining the lines of effort (LOE). U.S. UNCLASSIFIED REL NATO, GCTF, ISAF, MCFI, ABCA For Official Use Only 37 CENTER FOR ARMY LESSONS LEARNED To have an effective patrol debrief, the COIST must have a standardized patrol debrief format consistent with the reporting requirements of higher headquarters. This checklist allows for a detailed debrief and ensures all information collected by the patrol is captured. When a successful debrief is conducted, the COIST can analyze the information, develop it into an intelligence product, and distribute the product to the BN S-2. Additionally, this data will feed the intelligence cycle, continue the IPB process, and ultimately begin the next targeting cycle for the company, BN, and BCT. Two systems the S-2/COIST can use to capture this data are the Combined Information Data Network Exchange (CIDNE) and the Tactical Ground Reporting (TiGR) System. (Note: These databases are addressed extensively in Chapter 4.) The databases allow analysts the ability to upload text debriefs, assessments, and media; organize debriefs geographically; and allow adjacent units the ability to query the database utilizing filters. In addition to uploading the database, these systems allow other intelligence collectors the opportunity and ability to share and synchronize intelligence. It is imperative that Soldiers understand that patrol debriefs and operation debriefs are what feed the intelligence and targeting cycle. TiGR and CIDNE are two databases for the entry of company information; however, they have very different functions. CIDNE is for the receipt of formal reports such as a KLE or a civil affairs report. TiGR, on the other hand, is a tool that provides context to the report. As an example, “This KLE happened and this was the result” is a typical CIDNE report. “This KLE happened after a sophisticated attack delayed the patrol, and the village elder had been killed a day before” is a TiGR report on the same incident. The two systems are used together to enable the level of detail a COIST should provide to the company commander. Reports need to be entered directly into TiGR and not as an attached text report. An honesty trace must be used. Additionally, photographs and significant activities occurring during the patrol must be associated with that patrol. All this is done to ensure the data is searchable for later use. Debriefing checklists are helpful, but a debrief is not a check-the-block affair, and there must be room for free text within the debrief to portray the context and meaning of the information presented. Ensure the debrief format captures data that will pass the basic tests such as: • Is this report searchable through text? • Is this report searchable through geography? • Can this report be viewed with other similar reports (i.e., is it filterable through the system)? • Is it written in a format that is conducive to the use of the search tools provided? (For example, one-word answers to questions are almost worthless due to the inability of TiGR to run Boolean searches. As a result, paragraphs and sentences are required to provide context to the report, which then facilitate subsequent searches.). 38 U.S. UNCLASSIFIED REL NATO, GCTF, ISAF, MCFI, ABCA For Official Use Only COIST HANDBOOK There are several methods of debriefing patrols, and units should be prepared to use whichever technique best supports the situation. Each method can be modified as necessary, but there are pros and cons associated with each technique: • Debrief the entire patrol at one time: º Pros: Provides the best information and all points of view. º Cons: Takes time, and requires a large secure area. • Debrief squad leader and key leaders: º Pros: Faster, gets leader input, and requires less space. º Cons: Does not get all points of view. • Platoon leader and platoon sergeant debrief patrol, then debrief COIST: º Pros: Frees up COIST, and gets all points of view. º Cons: May take longer, requires training, and information may get lost in translation. • Platoon leader writes up debrief, and COIST reads and ask questions: º Pros: Less time-demanding for COIST since debrief is written. º Cons: May miss important information from other points of view. Ultimately, the S-2/COIST must analyze this data and answer the commander’s PIRs to update the ISR plan and answer any RFIs or intelligence gaps. Key intelligence items to discuss during the patrol debrief include the following: • Answers to PIRs, SIR, SOR, and observed actions and inactions in NAIs. • Route taken/route tasked and status of routes. • Observations of populace: º Key engagements º Items discussed º Attitudes observed º Photographs taken º Unusual sounds or odors º New graffiti/enemy propaganda º Changes to terrain or physical environment U.S. UNCLASSIFIED REL NATO, GCTF, ISAF, MCFI, ABCA For Official Use Only 39 CENTER FOR ARMY LESSONS LEARNED • Changes to operational graphics or observations from route/main supply route. • SOI assessments, observations, and notes from KLE. • Updates to ISR matrix and PIRs. • Updates to patrol-level PMESSII-PT, ASCOPE, and other related assessments. • Updates to town/village assessments. • Host nation security force assessments. • HIIDE device upload to BAT database. • Updates to intelligence databases (Command Post of the Future and TiGR). Target Development/Prioritizing Lethal and Nonlethal Targets It is imperative that all members of the target working group review all target nominations and understand how the enemy network ties into the AO/area of influence (AI) and adjacent units’ AOs and AIs. Identify and establish a working relationship with other agencies operating in your AO (i.e., explosive ordnance disposal, weapons intelligence team, and special operations forces) and share your targeting lines with these organizations to see how they fit into their targeting lines of operation (LOO)/LOE and targeting matrices. Synchronized targeting LOO/LOE facilitates an excellent joint effort to defeat the network and get in front of the enemy’s decision cycle. Consider, within the constraints of protection and operational security, sharing the targeting LOO/LOE with the host nation security forces. It is an opportunity to bring both host nation police and army leaders together and share intelligence. This can also be conducted jointly with military transition teams or security transition teams to fully integrate the coalition force/host nation security force targeting cycle. To increase the ability of host nation security force partners to conduct unilateral or bilateral operations, units are encouraged to distribute targeted personalities’ names (HPTL) and photographs to the host nation security forces and strive to conduct joint targeting with them. Synchronization and Integration of Intelligence, Surveillance, and Reconnaisssance and Collection Assets ISR synchronization has a significant impact on integrating lethal and nonlethal targets/fires. ISR synchronization is critical regardless of mission, but the importance is greatly increased with the size of the operational environment. To aggressively deter enemy actions, particularly with indirect fires, units need to detect the enemy before he can deliver assets. The challenges are that often this is placed solely in the hands of a very junior COIST/S-2 and is not synchronized with BCT and above-level assets. Units need to know what assets are available, request them based on predictive analysis, and most importantly, synchronize the effort to provide the best ISR coverage. This should be a significant part of the targeting 40 U.S. UNCLASSIFIED REL NATO, GCTF, ISAF, MCFI, ABCA For Official Use Only COIST HANDBOOK process at all levels, with focused emphasis on NAI refinement and the use of all available assets, including the myriad of nonstandard ISR platforms such as unit snipers, combat logistics patrols, and rotary- and fixed-wing flight crew debriefings and reports. Things to consider when requesting ISR: • Understand the air tasking order and the ISR cycle (usually 72–hour cycle). This is normally refined by the brigade aviation element and brigade collection management and dissemination process managers. • Understand the brigade’s collection priorities and what unit has priority of assets by type (human intelligence [HUMINT], signals intelligence [SIGINT], unmanned aircraft system [UAS], etc.). • Utilize the BN commander’s priorities from targeting meetings and target working groups, and ensure ISR assets (ground/aerial) are tied not only to PIRs but also to the target synchronization meeting. • Synchronize ISR with an NAI or TAI, and request the asset during times of combat operations or when it is thought the enemy is active in the specified geographic area. • Ensure all assets have a task and purpose and have clear reporting requirements (SOR). • Validate the collector requested is the correct asset to provide observation of the NAI. • Justify the need for collection systems by having companies and the BN staff attach a concept of the operation (CONOP) to the ISR request. The CONOP allows the collection manager to prioritize collection systems and will aid the requesting BN with obtaining the asset needed to support the mission. The COIST needs to address the following questions with the commander and the BN staff: • What intelligence sources are in the unit’s area of operation (HUMINT, SIGINT, etc.)? • How long does it take to get the information from subordinate collectors? • Does the architecture for data storage support rapid recall and manipulation? Are the following connections available, adequate, and functioning: joint network node, command post node, and SECRET Internet Protocol Router node access point? • What ISR and technical systems are available to find, fix, and finish targets? º When are they available? U.S. UNCLASSIFIED REL NATO, GCTF, ISAF, MCFI, ABCA For Official Use Only 41 CENTER FOR ARMY LESSONS LEARNED º Are any mutually exclusive? º How do we maintain coverage if one system is withdrawn or inoperative? Conclusion The COIST must disseminate and distribute intelligence products daily both up and down the chain of command. The COIST must ensure all collectors understand the commander’s PIRs and know how to answer them. This includes all patrols, Soldiers, and enablers (HUMINT collection teams, UAS, and SIGINT teams). The COIST must ensure patrol leaders/Soldiers understand the capabilities of enablers and how and when to request them. It is also imperative patrol leaders/Soldiers understand how to control assets once allocated in support of their AO. Patrol briefs are the key delivery method for sharing intelligence with adjacent and subordinate units. The COIST must receive and integrate intelligence products submitted daily from patrols and collectors. These products allow the COIST to refine intelligence estimates and update enemy assessments. Additionally, the COIST must receive the platoon leaders’ assessments of their respective AOs. The COIST is the company-level entity and entry point into fully integrated top-to-bottom and bottom-to-top intelligence and information exchange. The COIST does not replace or replicate the functions of higher-level intelligence cells but instead informs, coordinates with, and complements overall BCT and BN intelligence plans and collection efforts. The interrelationship, nesting, and integration of PIRs, SIR, SOR, and ISR planning and collection facilitate and necessitate the deliberate, thoughtful, and proactive integration of intelligence exchange and integration from the platoon level to the BCT level. 42 U.S. UNCLASSIFIED REL NATO, GCTF, ISAF, MCFI, ABCA For Official Use Only COIST HANDBOOK Chapter 6 Company Intelligence Support Team Targeting As discussed previously, a company-size element has very limited resources. At the brigade combat team (BCT) and battalion (BN) levels are adequately staffed sections to cover baseline requirements while at the same time contribute to staff planning meetings, working groups, and boards. The current operational environment has placed added emphasis on the targeting process in both lethal and nonlethal constructs. The BN and BCT target working group reviews all target nominations and attempts to understand how the enemy network ties into the area of operation (AO) and area of influence (AI) and adjacent units’ AOs and AIs. At these above company-level headquarters, synchronized targeting line of effort facilitates efforts to defeat enemy networks and get in front of the enemy’s decision cycle. The company intelligence support team (COIST) is the company-level entry point into the targeting process. The COIST, in addition to in-house analysis and targeting, feeds information gained from patrols and engagements to the company’s higher headquarters. This information is used to inform and assist the BN and BCT targeting cycle. At the COIST, the key to successful targeting is separating the important from the unimportant and then focusing and directing limited company and external resources where they can best and most positively influence the company area of responsibility (AOR). Targeting at the company level is actually sorting and prioritizing information from patrols and engagements until there is enough information to act on with an acceptable level of certainty. Company-level targeting is not limited to lethal means such as direct and indirect fires but should be all-encompassing and include all available assets such as building projects, security for host nation personnel, Medical Civic Action Program, and host nation police and military assistance. Many units use the fire support officer to lead the COIST. In these cases, the COIST may be expected to assume lead planning and responsibility at the company level for targeting, employing enablers, and other operations as directed by the commander. Company Intelligence Support Team Target Development Support A target is an entity or object considered for possible engagement or action by lethal or nonlethal means. It may be an area, complex, installation, force, equipment, capability, function, individual, group, system, entity, or behavior identified for possible action to support the commander’s objectives, guidance, and intent. Targeting is the process of selecting and prioritizing targets and matching the appropriate response to them, considering operational requirements and capabilities. The purpose of targeting is to disrupt, delay, or limit threat interference of friendly activities; it requires coordinated interaction between operations and intelligence personnel. Based on the commander’s guidance and targeting objectives, the staff determines what targets to engage and how and where to engage them. Targets should be assigned to the best systems to achieve the desired effects. Targeting is based on the enemy’s assets that provide them an advantage, U.S. UNCLASSIFIED REL NATO, GCTF, ISAF, MCFI, ABCA For Official Use Only 43 CENTER FOR ARMY LESSONS LEARNED friendly scheme of maneuver, and tactical plans. Targeting options can be either lethal or nonlethal. Targeting in stability operations requires a detailed understanding of social networks, insurgent networks, actions, and civil considerations. In stability operations, there is greater emphasis on the effects of combat operations on the local government, army, police, and civilian population. The consideration of second- and third-order effects is critical. For example, it makes sense to separate the insurgent forces from the local population. If friendly forces conduct a successful cordon and search and find a room full of improvised explosive devices (IEDs), the first order of effect is to potentially disrupt IED attacks. However, the second order of effects that must be addressed could be civilian concerns over damage caused by the cordon and search. If civilian concerns are not addressed, friendly forces may have to deal with demonstrations that will drain the combat power needed for other operations. If the population’s security and facility needs are not addressed, insurgent forces and weapons could/will return to the area, the third-order effect. Targeting Meeting The targeting meeting provides the company with a means to focus and synchronize the unit’s efforts based on the current enemy situation, current unit success, and operation orders and fragmentary orders from higher echelons. It is also a means of assessing current lethal and nonlethal effects to determine if a change to the current plan is needed. The end state of a targeting meeting is the commander’s decision for what to target, how to detect the target, how to deliver assets against the target, and how to assess the results of operations. The targeting meeting at the company is a regularly recurring event to keep the unit continuously focused on command priorities and to confirm whether the desired effects are being achieved. Targeting meetings can also be hasty meetings prior to missions to ensure the unit receives all relevant information and the commander’s most current and up-to-date guidance. Pretargeting Meeting To conduct successful targeting meetings, the COIST must have information prepared to share with all participants of the meeting. The COIST inputs for the pretargeting meeting are the following: • Light and weather data (received from higher headquarters). • Terrain data in the form of maps or imagery. • High-value target list (HVTL) with link and pattern analysis. • Current and proposed priority intelligence requirements (PIRs), specific information requirements (SIR), and specific orders and requests (SOR) (received from higher headquarters and refined by company). • Enemy course of action (COA) and event template. 44 U.S. UNCLASSIFIED REL NATO, GCTF, ISAF, MCFI, ABCA For Official Use Only COIST HANDBOOK • Battalion intelligence, surveillance, and reconnaissance (ISR) plan for the next 72 hours. • ISR assets available. COIST inputs for the targeting meeting include the following: • Light, weather, and terrain data. • Current enemy situation template, incident overlay, and link and pattern analysis. • Status of nonorganic ISR assets requested by the company. • Battle damage assessment of attacked targets as required (last 12–24 hours), highlighting changes in enemy capabilities. • Current and proposed PIRs, SIR, SOR, and high-value targets (HVTs). • Enemy COA for the targeting period. The COIST compiles data for the target packet from information received from higher echelons and information gathered by unit missions. The target packet should be an all-source product with vetted, validated information in support of the designated desired effect. This packet can be used for lethal and nonlethal targets. As the information is gathered, the COIST will assemble the information and create a packet for the HVT or the high-value individual (HVI). This product, if properly formatted, allows patrols to carry a reference guide on any mission. For nonlethal targets, its format can be used to keep files on important personnel in the unit AOR and can be used as a quick reference for units if there is a planned engagement or meeting with the individual. This is a working document and should be updated as any new information on the HVT or HVI is obtained. Subsequent pages will contain all other data known about the individual, including copies of the source reports. Targeting factors that should always be considered are the following: • Effective targeting demands accurate and well-organized intelligence. • Plan for site exploitation. • Be prepared for a follow-on mission. • Have an information operations message prepared for missions. • Beat the enemy to the media. • Update target packets upon completion of the mission. • Targets do not always have to be physical. (Think of ways to “steal” the enemy’s support base and safe haven.) In addition to the target packet, there are other analytic products and tools to assist the COIST and the unit in developing information for the AOR. Other products the U.S. UNCLASSIFIED REL NATO, GCTF, ISAF, MCFI, ABCA For Official Use Only 45 CENTER FOR ARMY LESSONS LEARNED COIST can maintain to assist with the targeting effort are a link diagram, HVTL, and be-on-the-lookout (BOLO) list. Diagram Human Networks Hostile individuals may blend with the population, but they will have a network of other individuals who will assist them. An example of when a link diagram is useful is an IED network. An IED explosion is the culmination of a networked operation that supported the IED. Someone emplaced the IED and may have initiated it. All of those “someones” make up a network. Some members of networks are more important than others; using the IED network example, financiers may support many operations. The IED maker builds many IEDs. Both will likely have contacts linking them to multiple IED incidents. Both of these individuals are important to the organization, whereas an individual who emplaces the IED is more easily replaced and less important. Additionally, it is important to remember that when an individual from the network is removed from the network, someone else must assume the duties of that individual. Diagramming human networks as they emerge in intelligence operations helps the unit see how the threat is organized. Diagrams will show which individuals are working together. The diagram should show both professional relationships and blood relationships as they are identified. Such diagrams will show missing links or unknown persons whose existence is deemed probable if not certain. The diagrams may have a name of an individual but no picture or a picture with no name. Units must update these link diagrams as information becomes available. Link diagrams can include information on individuals, such as the types of cars they drive and the locations of their houses. The key to link diagrams is to show the relationships between the hostile individuals. Link diagrams must be current to be useful. Update the diagram to show individuals who have been killed, captured, or recently released from jail. There are software programs such as Analyst Notebook and Analyst and eXploration of Information Sources Professional to build the diagrams. Microsoft PowerPoint also works well if the unit has no access to these programs. An example link diagram is shown in Figure 6. 46 U.S. UNCLASSIFIED REL NATO, GCTF, ISAF, MCFI, ABCA For Official Use Only COIST HANDBOOK Figure 6. Example link diagram High-Value Target List The HVTL is initially developed at the BCT or higher echelon and sent to the company. Sometimes the targets that are of high value to higher echelons are not of high value to the company; many will not even be in the company’s AO. The opposite is equally true. The company may be very interested in an individual who shoots at company Soldiers routinely. The individual is probably not an insurgent cell leader and the activities are not of high interest to higher echelons; however, the activities make him a HVI for the company. The company will take the initial HVTL and tailor it to the individuals affecting the company’s AOR. There is no standard number of individuals to be placed on the list; however, it should be prioritized with the most important individuals on top. The list should be maintained daily and information added or modified as it becomes available. If a target is detained, remove the individual from the active list, but keep the information so if the individual returns to the AOR, the data will still be available. The list can be managed in several different ways but should have an active and inactive component. If an individual has not been reported on in a set amount of time, remove him from the active list and place him on the inactive list. The following information should be placed on the list at a minimum: • Target number. When an individual becomes significant enough to be placed on the HVTL, he should receive a target tracking number and have a target packet started. • Name. Include the individual’s full name and any aliases. U.S. UNCLASSIFIED REL NATO, GCTF, ISAF, MCFI, ABCA For Official Use Only 47 CENTER FOR ARMY LESSONS LEARNED • Position. What does the unit believe this person does? This information is a brief explanation of where the individual fits into the threat picture in the AOR and why he is a HVT. • Address. Any known or suspected residences the individual may use. There may be several, and as more information becomes available, the unit can confirm or deny the validity of the addresses. • Phone number. Individuals will likely have more than one phone number and may change numbers frequently. • Picture. Include a picture of the individual, if available. • Remarks. This information is a freeform column where the unit can link associated reports to the individual, make notes about the individual, or put in a physical description. Even with a picture, a physical description helps because it describes height, weight, style of dress, and behavior. It can also have the latest date of information about the individual . Be-On-the-Lookout List The BOLO list tracks vehicles involved in hostile activity or belonging to individuals involved in hostile activities. If a unit finds a suspicious vehicle, the BOLO list is a quick-reference document to see if the vehicle has been previously reported in hostile activity. A BOLO list is a spreadsheet that contains the following information: • Make and type of vehicle. • Model. • Color. • License number. • Driver and passengers of the vehicle (names of hostile individuals associated with the vehicle). • Activity; why the vehicle is wanted. • Date the vehicle was last seen. • Last location by grid or route name. If local cars are not the same type of cars that would be seen in the United States, a book with pictures of the local cars should also be assembled. Targeting Standing Operating Procedures Units will develop targeting standing operating procedures (SOPs) to refine, streamline, and improve the overall company targeting process. An example company-level targeting SOP follows. 48 U.S. UNCLASSIFIED REL NATO, GCTF, ISAF, MCFI, ABCA For Official Use Only COIST HANDBOOK Lethal Targeting Operations • The COIST will develop company-level targets based on the commander’s PIRs/IRs. • Lethal operations must be conclusively researched through all SECRET Internet Protocol Router (SIPR)/Non-Secure Internet Protocol Router sources. • At a minimum, the COIST will provide three separate reports before committing to lethal operations: º SIPR (Combined Information Data Network Exchange) contains theater reporting through human intelligence (HUMINT), signals intelligence, and significant activities. Historical and recent reporting may be gained through this means. º Local sworn statements: * Sworn statements and reporting through host nation police agencies are an acceptable means of identifying lethal targets. * HUMINT collection teams may provide sworn statements for lethal operations. º Local detention facilities. Statements furnished to U.S. Army interrogators may also be used to identify lethal targets. • All lethal target operations must be approved through BN operations and the BN S-2 and assigned a target tracking number before operations. Lethal targeting packets will at a minimum include the following: • Cover with target number, date, and name of individual who assembled/updated the packet. • Target overview. • Personal description with known associates. • Link diagram. • Imagery of the object/target. • Reporting information. • Site exploitation plan. U.S. UNCLASSIFIED REL NATO, GCTF, ISAF, MCFI, ABCA For Official Use Only 49 CENTER FOR ARMY LESSONS LEARNED Nonlethal Targeting Operations Nonlethal operations encompass all civil affairs, engineering, medical, political, and social structures. Nonlethal operations are not only an effort to win hearts and minds but may be used to shift local power from anti-coalition forces to a local population that supports anti-insurgency activity. All nonlethal targeting operations must be approved through BN operations and assigned a target tracking number before execution. Nonlethal targeting packets should include at a minimum: • Cover with target number, date, and name of individual who assembled/updated the packet and classification. • Imagery with physical description, biographical information, background, and engagement goal. • Known relationships and associations. • Notes from previous engagements. • Intelligence updates. • Related civil-military operations projects. • Engagement worksheet. • Historical notes. Conclusion The COIST is the company-level entry point into the targeting process. The COIST records and analyzes information gained from patrols and engagements to the company’s higher headquarters. This information is used to inform and assist the BN/BCT targeting cycle. At the COIST, the key to successful targeting is separating the important from the unimportant and then focusing and directing limited company and external resources where they can best and most positively influence the company AOR. Targeting at the company level is actually sorting and prioritizing information from patrols and engagements until there is enough information to act on with an acceptable level of certainty. Company-level targeting is not limited to lethal means, such as direct and indirect fires, but should be all-encompassing and include all available assets. 50 U.S. UNCLASSIFIED REL NATO, GCTF, ISAF, MCFI, ABCA For Official Use Only COIST HANDBOOK Appendix A Ten-Step Tactical Ground Reporting System Debrief The slide presentation on the following pages graphically demonstrates an example ten-step method to employ the Tactical Ground Reporting (TiGR) system when debriefing patrols. The presentation addresses preparing the system, initiating a report, entering a patrol narrative, creating a record of the patrol's route, attaching media, affiliating the debrief, and saving the report. U.S. UNCLASSIFIED REL NATO, GCTF, ISAF, MCFI, ABCA For Official Use Only 51 CENTER FOR ARMY LESSONS LEARNED 52 U.S. UNCLASSIFIED REL NATO, GCTF, ISAF, MCFI, ABCA For Official Use Only COIST HANDBOOK U.S. UNCLASSIFIED REL NATO, GCTF, ISAF, MCFI, ABCA For Official Use Only 53 CENTER FOR ARMY LESSONS LEARNED 54 U.S. UNCLASSIFIED REL NATO, GCTF, ISAF, MCFI, ABCA For Official Use Only COIST HANDBOOK U.S. UNCLASSIFIED REL NATO, GCTF, ISAF, MCFI, ABCA For Official Use Only 55 CENTER FOR ARMY LESSONS LEARNED 56 U.S. UNCLASSIFIED REL NATO, GCTF, ISAF, MCFI, ABCA For Official Use Only COIST HANDBOOK U.S. UNCLASSIFIED REL NATO, GCTF, ISAF, MCFI, ABCA For Official Use Only 57 CENTER FOR ARMY LESSONS LEARNED 58 U.S. UNCLASSIFIED REL NATO, GCTF, ISAF, MCFI, ABCA For Official Use Only COIST HANDBOOK U.S. UNCLASSIFIED REL NATO, GCTF, ISAF, MCFI, ABCA For Official Use Only 59 CENTER FOR ARMY LESSONS LEARNED 60 U.S. UNCLASSIFIED REL NATO, GCTF, ISAF, MCFI, ABCA For Official Use Only COIST HANDBOOK U.S. UNCLASSIFIED REL NATO, GCTF, ISAF, MCFI, ABCA For Official Use Only 61 CENTER FOR ARMY LESSONS LEARNED 62 U.S. UNCLASSIFIED REL NATO, GCTF, ISAF, MCFI, ABCA For Official Use Only COIST HANDBOOK PROVIDE US YOUR INPUT To help you access information quickly and efficiently, Center for Army Lessons Learned (CALL) posts all publications, along with numerous other useful products, on the CALL Web site. The CALL Web site is restricted to U.S. government and allied personnel. PROVIDE FEEDBACK OR REQUEST INFORMATION <http://call.army.mil> If you have any comments, suggestions, or requests for information (RFIs), use the following links on the CALL home page: “Request for Information or a CALL Product” or “Give Us Your Feedback.” PROVIDE TACTICS, TECHNIQUES, AND PROCEDURES (TTP) OR SUBMIT AN AFTER ACTION REVIEW (AAR) If your unit has identified lessons learned or TTP or would like to submit an AAR, please contact CALL using the following information: Telephone: DSN 552-9569/9533; Commercial 913-684-9569/9533 Fax: DSN 552-4387; Commercial 913-684-4387 NIPR e-mail address: call.rfimanager@conus.army.mil SIPR e-mail address: call.rfiagent@conus.army.smil.mil Mailing Address: Center for Army Lessons Learned, ATTN: OCC, 10 Meade Ave., Bldg 50, Fort Leavenworth, KS 66027-1350. TO REQUEST COPIES OF THIS PUBLICATION If you would like copies of this publication, please submit your request at: <http://call. army.mil>. Use the “Request for Information or a CALL Product” link. Please fill in all the information, including your unit name and official military address. Please include building number and street for military posts. U.S. UNCLASSIFIED REL NATO, GCTF, ISAF, MCFI, ABCA For Official Use Only 63 CENTER FOR ARMY LESSONS LEARNED PRODUCTS AVAILABLE “ONLINE” CENTER FOR ARMY LESSONS LEARNED Access and download information from CALL’s Web site. CALL also offers Web-based access to the CALL Archives. The CALL home page address is: <http://call.army.mil> CALL produces the following publications on a variety of subjects: • • • • • • Combat Training Center Bulletins, Newsletters, and Trends Special Editions News From the Front Training Techniques Handbooks Initial Impressions Reports You may request these publications by using the “Request for Information or a CALL Product” link on the CALL home page. COMBINED ARMS CENTER (CAC) Additional Publications and Resources’ The CAC home page address is: <http://usacac.army.mil/cac2/index.asp> Battle Command Knowledge System (BKS) BCKS supports the online generation, application, management, and exploitation of Army knowledge to foster collaboration among Soldiers and units in order to share expertise and experience, facilitate leader development and intuitive decision making, and support the development of organizations and teams. Find BCKS at <http://usacac.army.mil/cac2/bcks/ index.asp>. Center for Army Leadership (CAL) CAL plans and programs leadership instruction, doctrine, and research. CAL integrates and synchronizes the Professional Military Education Systems and Civilian Education System. Find CAL products at <http://usacac.army.mil/cac2/cal/index.asp>. Combat Studies Institute (CSI) CSI is a military history think tank that produces timely and relevant military history and contemporary operational history. Find CSI products at <http://usacac.army.mil/cac2/csi/ csipubs.asp>. 64 U.S. UNCLASSIFIED REL NATO, GCTF, ISAF, MCFI, ABCA For Official Use Only COIST HANDBOOK Combined Arms Center-Training: The Road to Deployment This site provides brigade combat teams, divisions, and support brigades the latest road to deployment information. This site also includes U.S. Forces Command’s latest training guidance and most current Battle Command Training Program Counterinsurgency Seminars. Find The Road to Deployment at <http://rtd.leavenworth.army.smil.mil> (requires SIPRNET password and ID). Combined Arms Doctrine Directorate (CADD) CADD develops, writes, and updates Army doctrine at the corps and division level. Find the doctrinal publications at either the Army Publishing Directorate (APD) <http://www.usapa. army.mil> or the Reimer Digital Library <http://www.adtdl.army.mil>. Foreign Military Studies Office (FMSO) FMSO is a research and analysis center on Fort Leavenworth under the TRADOC G2. FMSO manages and conducts analytical programs focused on emerging and asymmetric threats, regional military and security developments, and other issues that define evolving operational environments around the world. Find FMSO products at <http://fmso.leavenworth.army.mil/>. Military Review (MR) MR is a revered journal that provides a forum for original thought and debate on the art and science of land warfare and other issues of current interest to the U.S. Army and the Department of Defense. Find MR at <http://usacac.army.mil/cac2/militaryreview/index.asp>. TRADOC Intelligence Support Activity (TRISA) TRISA is a field agency of the TRADOC G2 and a tenant organization on Fort Leavenworth. TRISA is responsible for the development of intelligence products to support the policymaking, training, combat development, models, and simulations arenas. Find TRISA Threats at <https://dcsint-threats.leavenworth.army.mil/default.aspx> (requires AKO password and ID). Combined Arms Center-Capability Development Integration Directorate (CAC-CDID) CAC-CDIC is responsible for executing the capability development for a number of CAC proponent areas, such as Information Operations, Electronic Warfare, and Computer Network Operations, among others. CAC-CDID also teaches the Functional Area 30 (Information Operations) qualification course. Find CAC-CDID at <http://usacac.army.mil/cac2/cdid/index. asp>. U.S. Army and Marine Corps Counterinsurgency (COIN) Center The U.S. Army and Marine Corps COIN Center acts as an advocate and integrator for COIN programs throughout the combined, joint, and interagency arena. Find the U.S. Army/U.S. Marine Corps COIN Center at: <http://usacac.army.mil/cac2/coin/index.asp>. Joint Center for International Security Force Assistance (JCISFA) JCISFA’s mission is to capture and analyze security force assistance (SFA) lessons from contemporary operations to advise combatant commands and military departments on appropriate doctrine; practices; and proven tactics, techniques, and procedures (TTP) to prepare for and conduct SFA missions efficiently. JCISFA was created to institutionalize SFA across DOD and serve as the DOD SFA Center of Excellence. Find JCISFA at <https://jcisfa.jcs.mil/ Public/Index.aspx>. Support CAC in the exchange of information by telling us about your successes so they may be shared and become Army successes. U.S. UNCLASSIFIED REL NATO, GCTF, ISAF, MCFI, ABCA For Official Use Only 65